• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Black Hat – Windows isn’t the only mass casualty platform anymore
Security

Black Hat – Windows isn’t the only mass casualty platform anymore

August 15, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Black Hat – Windows isn’t the only mass casualty platform anymore
Share
Facebook Twitter LinkedIn Pinterest Email

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars

In years past, a massive Windows exploit netted mass casualties, but here at Black Hat, talks turned toward other massive attack platforms like clouds and cars. Windows is no longer alone at the front of the pack, hackwise – it has company.

It makes sense. If you can find a cloud exploit like one presented here on multi-tenant cloud platform database hacks, one user can slurp up data from another company with a few commands. That’s not good.

The cloud, by nature, is multi-tenant. This means multiple clients rent a segment of a single shared resource from a cloud provider. But where the intersections exist between tenants and hardware, a single flaw can expose many tenants to badness, and how would they know? How would you know?

Cloud vendors are more anxious to publish their security efforts than their security holes. And unlike Windows, where malware has to go snooping about machine by machine with comparatively small connections between them, the cloud naturally facilitates massive exploit spreading velocity between platforms, users, and data.

While some cloud vendors have made promises to protect you against this sort of thing, they favor themselves over your data. You, on the other hand, probably feel your own data is the more important thing.

Still, there’s a perfect storm between massive-scale attack surfaces, single security implementations across those whole entire providers’ fabrics, and the potential for one security hole to spread like wildfire and gobble up many companies’ data in record time.

See also  Discord says Android customers received’t be left hanging anymore – DailyTech

It’s true that the companies here at Black Hat are leaning into the problem and are more aware than more rank-and-file cloud users, but there are many more small businesses out there that don’t have the resources – they’re focusing on trying to stay in business in a tough economy.

To the large cloud providers’ credit, they tend to handle security reports relatively quickly. But when seconds count, they’ll have it fixed in days or weeks. That’s plenty of time for a single exploit to wipe out many companies.

I’m typing this from a car security session, one where someone figured out how – using cheap hardware – to hack a whole class of cars across multiple manufacturers. How would a manufacturer fix that and roll out the fix in a meaningful timeframe?

Meanwhile, this hack would allow a fleet of tow trucks could go scoop up swaths of certain families of cars and spirit them off to the chop shop, using replay attacks on key fob signals to unlock them. That also means if you pay off a parking attendant to install a listener, you can shop selectively and harvest a crop of cars of your liking.

Whether attackers focus on manipulating (jamming/replaying) signals from a key fob, or hacking key management and cryptographic algorithms: the session quoted UK Daily Mail, saying such attacks are on the rise, citing “keyless entry car technology now accounts for nearly 50% of all vehicle threats”.

It’s no longer a theoretical threat. There is even a company that started rolling out car security scorecards by model.

See also  Raising Startup Funding Used to Be Easy—Not Anymore

Windows crowded the stage for quite a long time here at Black Hat, but now there’s competition, the scary, fast-spreading kind, that can truly wreak havoc if unchecked.

Source link

anymore Black casualty Hat isnt mass platform Windows
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

WD Black SN770M review

November 1, 2023

Meta Isn’t Enforcing Its Own Political Ads Policy, While the 2024 US Election Looms

September 1, 2023

The World Isn’t Ready for the Next Decade of AI

August 16, 2023

Tapping His Experience, Serial Tech Entrepreneur Launches VC Firm To Back Black Founders

July 31, 2023
Add A Comment

Comments are closed.

Editors Picks

Capcom income declines almost 50% year-over-year

July 31, 2022

Family Plan currently in testing for Xbox Game Pass

August 6, 2022

Starting A Business Begins With A Plan

December 6, 2022

TCL RC630K QLED Roku TV review

January 10, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.